We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

How to Do Data Protection Against Ransomware

How to Do Data Protection Against Ransomware

posted in Disaster Recovery ● 3 Mar 2016

Malware and cybercrime: a match made in heaven. But it’s the malware that makes it so darn difficult to prevent. Between viruses, worms, adware, spyware, etcetera… the IT manager has a near impossible task of data protection through blocking, routing, zoning, and scanning for threats and weaknesses in the company’s network and software systems.

Ransomware, however, can be especially debilitating, depending on the strength of the attacker’s resolve and the strength of your negotiator. Such an attack basically involves a program being installed, through a worm or virus that carries the program, on a computer and then locks it down thereby suspending any activities on the computer. No one is able to operate or bypass it unless they respond to the demands displayed on the screen – usually for vast sums of money.

Attackers Don’t Discriminate

This was recently demonstrated when the Hollywood Presbyterian Medical Centre in the US was caught unawares and held to ransom for its fortune (since Presbyterian hospitals are obviously rolling in it). Sadly, this affected operations at the hospital for more than a week while officials scrambled to collect the bitcoins that were being extorted. News reports are unclear whether it was for the value of 17 000 USD or 3.4 million USD, but the point is, they had to pay up.

Complying with attackers’ demands is usually the path of least resistance, and has a fairly predictable result. Unfortunately, you end up on the losing side of this little power play. So a far better approach would be to even out the odds between you and the attacker by being prepared. Besides the blocking, routing, zoning, and scanning for threats, an effective data protection solution will save the day.

A Better Data Protection Solution

Tip 1. By keeping regular backups of your systems, with as short an interval between backups as is practically possible (i.e. having a low Recovery Point Objective/RPO), a recent copy of your data will always be available. Consider a cloud-based backup solution if you don’t want to shell out for the purchase and maintenance of data storage. Otherwise, just make sure you keep the latest copies of your most important information on site.

Tip 2. But having the backups is only as good as being able to restore them. Proper data protection also means that you’ll need the right infrastructure in place to facilitate data recovery as quick as possible (i.e. a low Recovery Time Objective/RTO). A cloud-based data protection solution will also ensure that your data is kept off-site and out of harm’s reach.

Tip 3. Whether your backups are kept on the premises or off-site, regularly test your data protection solution for integrity and completeness. This will ensure that when the time comes, you’ll have the right data at your disposal and you’ll know that your data recovery will be effective.

The bottom line is, by recovering systems in this fashion you’ll essentially be overriding any malware infection and getting your IT systems to a working state once again.

Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading
Benefits of Outsourced Data Backup

Analysing the benefits of outsourced data backup

There are many reasons that businesses and their IT teams may weigh up the option to backup and protect data with an inhouse solutions versus outsourcing data backup.

Continue reading